IdentitytheftSmartcardsPiracyDatabaseSoftwareIntranetPresentationSoftwareDatabaseMarketingComputerNetworkMemoryTelecommutingSpreadsheetsoftwareWhiteCollarCrimeScannersHardwareComputerSystemProgramInternalDataSourcesInputOutputOperatingSystemSoftwareProcessingComputerLiteracyComputerVirusDisplacedworkersRecordManagementSystemManagementVideoconferencingComputeraideddesignEcommerceIdentitytheftSmartcardsPiracyDatabaseSoftwareIntranetPresentationSoftwareDatabaseMarketingComputerNetworkMemoryTelecommutingSpreadsheetsoftwareWhiteCollarCrimeScannersHardwareComputerSystemProgramInternalDataSourcesInputOutputOperatingSystemSoftwareProcessingComputerLiteracyComputerVirusDisplacedworkersRecordManagementSystemManagementVideoconferencingComputeraideddesignEcommerce

Unit 6 Chapter 5 - Call List

(Print) Use this randomly generated list as your call list when playing the game. Place some kind of mark (like an X, a checkmark, a dot, tally mark, etc) on each cell as you announce it, to keep track. You can also cut out each item, place them in a bag and pull words from the bag.


1
B
2
B
3
B
4
O
5
G
6
I
7
G
8
N
9
G
10
O
11
B
12
G
13
I
14
N
15
I
16
O
17
G
18
O
19
N
20
B
21
G
22
B
23
N
24
N
25
O
26
I
27
I
28
O
29
I
  1. B-Identity theft
  2. B-Smartcards
  3. B-Piracy
  4. O-Database Software
  5. G-Intranet
  6. I-Presentation Software
  7. G-Database Marketing
  8. N-Computer Network
  9. G-Memory
  10. O-Telecommuting
  11. B-Spreadsheet software
  12. G-White Collar Crime
  13. I-Scanners
  14. N-Hardware
  15. I-Computer System
  16. O-Program
  17. G-Internal Data Sources
  18. O-Input
  19. N-Output
  20. B-Operating System Software
  21. G-Processing
  22. B-Computer Literacy
  23. N-Computer Virus
  24. N-Displaced workers
  25. O-Record Management System
  26. I-Management
  27. I-Videoconferencing
  28. O-Computer aided design
  29. I-Ecommerce